General

  • Target

    loader.bin

  • Size

    15.8MB

  • Sample

    220626-s4rqjabder

  • MD5

    75941eabd47ddaa0529e6bf66068eccd

  • SHA1

    34d7b2683a149871591d3629b4da456064331ebd

  • SHA256

    5956fe13a88b4ee1006ba35a0c2bb1797c9d925c453c368aac628870ca8ee4ba

  • SHA512

    6d64ee77f9f08b3843031825e110a787efe81dddc72355e636659d53cdf697d663ff9c655cd89d41b5afeab88b8a3f7e4a2b049d77eb705e3c6b7ac817ea0c03

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/973580174689964083/2sajMUbGeKbojdqVMbPo-qtidMXn5a7QaYSzjXpRpUgg81vxQoCnZ2D4zH6jyVu9DL96

Targets

    • Target

      loader.bin

    • Size

      15.8MB

    • MD5

      75941eabd47ddaa0529e6bf66068eccd

    • SHA1

      34d7b2683a149871591d3629b4da456064331ebd

    • SHA256

      5956fe13a88b4ee1006ba35a0c2bb1797c9d925c453c368aac628870ca8ee4ba

    • SHA512

      6d64ee77f9f08b3843031825e110a787efe81dddc72355e636659d53cdf697d663ff9c655cd89d41b5afeab88b8a3f7e4a2b049d77eb705e3c6b7ac817ea0c03

    • 44Caliber

      An open source infostealer written in C#.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks